Computer engineers at the University of Michigan and Rice University have devised a comprehensive way to head off this costly infringement: Each chip would have its own unique lock and key. The patent holder would hold the keys. The chip would securely communicate with the patent-holder to unlock itself, and it could operate only after being unlocked.
The technique is called EPIC, short for Ending Piracy of Integrated Circuits. It relies on established cryptography methods and introduces subtle changes into the chip design process. But it does not affect the chips' performance or power consumption.
Michigan computer engineering doctoral student Jarrod Roy will present a paper on EPIC at the Design Automation and Test in Europe conference in Germany on March 13.
Integrated circuit piracy has risen in recent years as U.S. companies started outsourcing production of newer chips with ultra-fine features. Transferring chip blueprints to overseas locations opened new doors for bootleggers who have used the chips to make counterfeit MP3 players, cell phones and computers, among other devices.
This is a very new problem, said Igor Markov, associate professor in the Department of Electrical Engineering and Computer Science at U-M and a co-author of the paper.
"Pirated chips are sometimes being sold for pennies, but they are exactly the same as normal chips," Markov said. "They were designed in the United States and usually manufactured overseas, where intellectual property law is more lax. Someone copies the blueprints or manufactures the chips without authorization."
A cutting-edge fabrication facility costs between $3 billion and $4 billion to build in the United States., said Farinaz Koushanfar, assistant professor in the Department of Electrical and Computer Engineering at Rice University and a co-author on the paper.
"Therefore, a growing number of semiconductor companies, including Texas Instruments and Freescale (a former division of Motorola), has recently announced that they would cease manufacturing chips with finer features, and outsource production to East Asia. However, even in U.S. facilities, working chips are sometimes reported defective by individual employees and later sold in gray markets," Koushanfar said.
With EPIC protection enabled, each integrated circuit would be manufactured with a few extra switches that behave like a combination lock. Each would also have the ability to produce its own at least 64-bit random identification number that could not be changed. The chips would not be manufactured with an ID number, but instead with the tools needed to produce the number during activation.
In the EPIC framework, chips wouldn't work correctly until they were activated. To activate a chip, the manufacturer would plug it in and let it contact the patent owner over an ordinary phone line or Internet connection.
"All chips are produced from the same blueprint, but differentiate themselves when they are turned on for the first time and generate their ID," Roy said. "Nothing is known about this number before activation."
The chip would transmit its ID securely to the patent owner. The patent owner would record the number, figure out the combination to unlock that particular chip, and respond securely with the key.
The uniqueness of the activation key rules out the possibility that someone could observe it and reuse it without cracking it. Because the key is generated on the fly, it wouldn't make sense to copy it like you could copy software activation keys, which are printed on CD envelopes.
Theoretically, there are ways to illegally copy chips protected by EPIC, Markov said. But EPIC makes this very difficult.
"If someone was really bent on forging and had a hundred million dollars to spend, they could reverse-engineer the entire chip by taking it apart. But the point of piracy is to avoid such costs," he said. "The goal of a practical system like ours is not to make something impossible, but to ensure that buying a license and producing the chip legally is cheaper than forgery."Michigan Engineering:
Nicole Casal Moore | EurekAlert!
Machine learning speeds modeling of experiments aimed at capturing fusion energy on Earth
20.05.2019 | DOE/Princeton Plasma Physics Laboratory
New flying/driving robot developed at Ben-Gurion University of the Negev
20.05.2019 | American Associates, Ben-Gurion University of the Negev
Engineers at the University of Tokyo continually pioneer new ways to improve battery technology. Professor Atsuo Yamada and his team recently developed a...
With a quantum coprocessor in the cloud, physicists from Innsbruck, Austria, open the door to the simulation of previously unsolvable problems in chemistry, materials research or high-energy physics. The research groups led by Rainer Blatt and Peter Zoller report in the journal Nature how they simulated particle physics phenomena on 20 quantum bits and how the quantum simulator self-verified the result for the first time.
Many scientists are currently working on investigating how quantum advantage can be exploited on hardware already available today. Three years ago, physicists...
'Quantum technologies' utilise the unique phenomena of quantum superposition and entanglement to encode and process information, with potentially profound benefits to a wide range of information technologies from communications to sensing and computing.
However a major challenge in developing these technologies is that the quantum phenomena are very fragile, and only a handful of physical systems have been...
Working group led by physicist Professor Ulrich Nowak at the University of Konstanz, in collaboration with a team of physicists from Johannes Gutenberg University Mainz, demonstrates how skyrmions can be used for the computer concepts of the future
When it comes to performing a calculation destined to arrive at an exact result, humans are hopelessly inferior to the computer. In other areas, humans are...
Scientists develop a molecular recording tool that enables in vivo lineage tracing of embryonic cells
The beginning of new life starts with a fascinating process: A single cell gives rise to progenitor cells that eventually differentiate into the three germ...
29.04.2019 | Event News
17.04.2019 | Event News
15.04.2019 | Event News
20.05.2019 | Materials Sciences
20.05.2019 | Life Sciences
20.05.2019 | Power and Electrical Engineering